Board logo

subject: VOIP Security Vulnerabilities and Protective Measures-VOIP, vulnerabilities, solutions - communications industry [print this page]


VOIP Security Vulnerabilities and Protective Measures-VOIP, vulnerabilities, solutions - communications industry

With the continuous expansion of data bandwidth, Fast or Gigabit to the desktop has become possible. Enhance the bandwidth for voice transmission in data networks provide a strong prerequisite. At the same time, VoIP Technology is mature, similar to the voice compression, Qos topics like quality assurance are all widely discussed and reached consensus. Can be said that VoIP technology has been from the original experimental real special to a mature business applications.

While in China the first application of VoIP or circuit-switched carriers to do additional, but now there are many enterprises from VoIP users begin to pay attention to this application. For the emerging small office business, using new data network sufficient bandwidth to carry voice, than to build an independent voice system to facilitate a number of functions are also available, such as mobile office and other traditional voice switches, the functions are not available. For industrial users, because each branch connecting node data network, using IP relay to the headquarters and branch nodes of the Internet can save high rental costs of long-distance relay circuit. Therefore, VoIP technology in the enterprise user groups will have broad application.

However, in the implementation of the project or during use, users and equipment manufacturers to supply more of their energies on how to improve the audio quality and network integration with existing data above, there is little regard to the security of VoIP hidden. As we will have an important place application server Firewall Within the protection of the same; In fact, in the case of VoIP, voice and data applications is the same, has become a month's "Packet", the same will be subjected to various viruses and hacker attacks disturbance. No wonder people laugh, said: "This is the first time in history, computer viruses can make your phone does not work."

How several factors that affect VoIP? The first is the product itself. Currently the most commonly used VoIP technology to establish and control of voice signaling protocols are H.323 and SIP. Despite some differences between them, but in general the agreement is an open system. Equipment manufacturers will have to carry separate components, including IP Terminal Sign, Gatekeeper and signaling continuation. Some of these products using WindowsNT operating system, although some were based on Linux or VxWorks. The more open operating system, but also more vulnerable to viruses and malicious attacks. In particular, certain equipment required to provide Web-based administration interface, that they will have the opportunity to use MicrosoftIIS or Apache to provide services, products manufactured in these applications are already installed in the device when the were unable to guarantee or promise is the latest version have to make up some security holes.

Second is based on an open port DoS (Denial of Service) attacks. Methods from network attacks and the resulting destructive effect of view, DoS be a simple and effective attack. Attacker to send to the server a considerable number of service requests with false addresses, but because the return address contained false, the server will not return messages, etc., until all resources are exhausted. VoIP technology has many well-known ports such as 1719,1720,5060. Some ports are needed for remote management of the product itself, or use private messaging, word, than the normal more than a simple data applications. As long as the attacker's PC and the applications port on the same network segment, you can scan through the simple tools, such as X-Way shareware like to get more detailed information.

A recent security vulnerability by NISCC (UKNationalInfrastructureSecurityCo-ordi-nationCenter) suggested that test results show that: "the market a lot of VoIP systems using H.323 protocol to establish the process in H.245 are loopholes, easy to port 1720 on the subject to DoS attacks, leading to system instability or even paralysis. "

Again is theft of services, this analog phone in the same circumstances exist.




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0